eMudhra's security policies have been designed to offer highest level of assurance to its users. Built in industry leading infrastructure and designed with best in class security features, eMudhra's platforms are rigorously audited to protect customer data.

eMudhra's security program is built on two core priniciples

trust-deliver

Deliver Complete Trust

eMudhra has a decade old history of operating as a trust service provider in global markets with 100% compliance to local regulatory requirements. This helps us deliver trust in both of our consumer and enterprise facing applications. eMudhra's operations are periodically audited for ISO and CMMI compliance. eMudhra's CA operations are also Webtrust accredited.

trust-deliver

Use Cutting Edge Technology to power Security

eMudhra's technology stack uses industry leading techniques in cryptography, latest systems that guard end points and a host of security measures at application, network and database levels to protect sensitive data. This is backed up by round the clock monitoring, logging and continuous training and awareness programs.

The Security Posture

The Security Posture is implemented and enforced by a dedicated security team. This team works round the clock and is responsible for infrastructure, application and database security and compliance. The security team also gets themselves involved in all aspects of the product development lifecycle and conduct vulnerability assessment and penetration testing before all critical releases.
Our approach to security is multi-layered starting from the data and going all the way upto the end user. This is reflected in our product offerings all of which use one or more ways listed below to protect sensitive information.

Data

  • Use of encryption and hashing techniques to protect personal data
  • Use of HSM's to store keys that can be used to sign or encrypt information
  • Access control mechanism for employees and customers on our platforms to restrict access to data
  • Regular backups of data is taken out of our core systems from a disaster recovery standpoint
  • Retention of data as per local laws or in compliance with customer requirements

Application

  • Software Development Lifecycle best practices used in accordance with CMMI maturity model
  • Vulnerability Assessment and Penetration Testing done on all key components of applications
  • Training on Secure Coding and Security Design principles
  • Top Management Review on Information Security compliance

Infrastructure

  • Our CA operations, related applications and analytics platforms are hosted at our own Tier III data centre which is audited yearly by external auditors
  • Other applications are hosted on Amazon Web Services and Hetzner (Germany) both of whom are highly reputed when it comes to ensuring security compliance
  • AWS data centres are frequently audited and comply with a comprehensive set of frameworks including ISO 27001, SOC 1, SOC 2, SOC 3, PCI DSS
  • AWS physical data centers have stringent physical access controls in place to ensure that no unauthorized access is permitted including biometric access controls and twenty-four-hour armed guards and video surveillance.
  • All of our infrastructure is monitored and logged for key security events
  • Access Control mechanism as listed in our Information Security policy is followed to prevent unauthorized access to sensitive applications
  • Hosts running various applications are scanned periodically for vulnerabilities and patched for security updates and critical patchfixes

End User Security

  • End Users have anti-virus tools installed that control access to various websites, monitor traffic in-out of the computer and log key events
  • Firewalls deployed at our offices prevent access to unauthorized content
  • For certain customer engagements that require higher security, eMudhra has isolated zones that isolate network traffic for those specificemployees
  • eMudhra also uses industry leading email systems provided by Office 365 and Gmail to its employees

eMudhra Assurance Program

eMudhra continuously strives to raise its bar as far its security policy and focus is concerned.

Below are our certifications and compliance attestations

iso-logo gdpr-logo cmmi-logo webtrust-logo eal4-logo

ISO 27001

ISO 27001 is a compliance framework that establishes Information Security Management System (ISMS) standards to identify and manage information risks through a comprehensive set of company-wide processes and controls. Additionally, ISMS embodies principles of continuous improvement to keep abreast with changes in the threats landscape to address them proactively.

Download our ISO certificates

CMMI

CMMI refers to Capability Maturity Model Integration (CMMI) and is a process level improvement training and appraisal program for software development. Administered by the CMMI Institute, a subsidiary of ISACA, it was developed at Carnegie Mellon University (CMU). It is required by many United States Department of Defense (DoD) and U.S. Government contracts, especially in software development.

To see eMudhra's CMMI certification, Click here

GDPR

eMudhra's platforms are GDPR ready. To learn more about the capabilities and support we have put in place, please refer to our GDPR resources.

Webtrust

CMMI refers to Capability Maturity Model Integration (CMMI) and is a process level improvement training and appraisal program for software development. Administered by the CMMI Institute, a subsidiary of ISACA, it was developed at Carnegie Mellon University (CMU). It is required by many United States Department of Defense (DoD) and U.S. Government contracts, especially in software development.

EAL 4+ Common Criteria

The Evaluation Assurance Level (EAL1 through EAL7) of an IT product or system is a numerical grade assigned following the completion of a Common Criteriasecurity evaluation, an international standard in effect since 1999. The increasing assurance levels reflect added assurance requirements that must be met to achieve Common Criteria certification. The intent of the higher levels is to provide higher confidence that the system's principal security features are reliably implemented. The EAL level does not measure the security of the system itself, it simply states at what level the system was tested eMudhra's CA system is undergoing testing at EAL Level 4, which is applicable in those circumstances where developers or users require a moderate to high level of independently assured security.

Let us help you find the right solution